Abstract
Cybercrime, data breaches, and fraud represent evils that significantly threaten businesses. Companies have, in the past, lost much to these crimes and, hence, must come up with plans to prevent such future occurrences. In this paper, the processes information technology security audits entail and how such audits enhance organizational IT security will be dealt with. According to research on the subject, IT security auditing constitutes a significant step in the safeguarding of corporate data against cybercrime, data breaches, and fraud. It must be performed from time to time in the form of a methodical analysis by an outside specialist on compliance, for identifying any chinks in the armor of the company's information technology system.
Introduction
ICT advancements have meant the availability of vast quantities of data, which also creates considerable risks to the data itself, computer systems, and critical infrastructures and operations it supports. Despite developments in information security, numerous information systems continue to display susceptibility to both external and internal breaches (Suduc, Bîzoi & Filip, 2010). Internal information security auditing enhances the likelihood of implementation of suitable security measures for averting such breaches and reducing their adverse impacts.
Security risks
Two classes of risks exist, against which corporate information systems require protection: logical and physical. The latter, more to do with devices as compared to the actual information system, encompasses natural calamities like floods, earthquakes, typhoons, among others, terror attacks, vandalism, fire outbreak, illegal tampering, power surges, and break-ins. Vlad and Lenghel (2017) put forward a collection of controls defending information systems from such physical threats.
The controls include different kinds of locks, hardware insurance coverage, and coverage of information recreation costs, having processes in place for everyday data and information system backups, tested, state-of-the-art disaster recovery interventions, and rotation and off-site backup data storage in a secure place. Logical risks denote illegal access and purposeful or inadvertent modification or destruction of information or the whole information system. Such threats may be reduced using logical security controls, limiting user system accessibility, and averting unauthorized system access. All of the precautions above prove ever more salient when one is dealing with central information systems.
Suduc and colleagues (2010) claim that modern-day corporations need to deal with the following major kinds of information technology risks: availability, security, compliance, and performance risks. Security risks constitute accessing data without permission, including information leakage, fraud, endpoint security, and data privacy. This class also encompasses broad threats from external sources (e.g., viruses), and more focused attacks on particular users, data, or applications. A survey performed by Ernst and Young revealed security incidents costing as much as 17-28 million dollars per case to organizations (Suduc et al., 2010). A second study conducted over 13 years using the assistance of a total of 522 American IT security experts revealed virus incidents as being the most frequent risk (49 percent of respondent firms). The next most commonly occurring event was insider network abuse (44 percent) and, subsequently, mobile device (including laptop) theft (42 percent) (Suduc et al., 2010). Even corporate security measures concentrate on external threats owing to their disturbingly high incidence (sometimes more than half the sum total of risks) and to their origins lying in legal network use.
Audit for IS Security
Khan (2017) reports that despite significant developments in the field of information security, like object/subject access matrix model, star-property- and information flow- reliant multilevel security, access control lists, cryptographic protocol, and public-key cryptography, several information systems continue to be at risk of internal as well as external attacks. Security setups are a time-consuming process and do not play any part in helpful output; hence, nobody will realize until an audit is done or the system is attacked, in case of an overly permissive setup. The above finding underscores the need for internal IT security auditing in all companies.
According to a Security Administrator and System Auditor having nearly two decades of experience, it is imperative to routinely monitor the following computer activity domains: user access control, audit trail, and system activity monitoring (Davis & Yen, 2019; Suduc et al., 2010). The abovementioned tasks are not open to primary security measure adoption mechanisms put forward by Suduc and coworkers (2010). These security measures include authenticating principals (including who said it, or which entities have access to that data – i.e., individuals, groups, programs, or devices). Moreover, these measures also include authorizing access ("Which entities are permitted to carry out what operations on a given object?") and decision auditing ("what occurred and what was the reason for its occurrence").
The...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now